Attivo’s BOTsink 2500 is
an on-premise and in-cloud APT and BOT security appliance/VM designed to
augment your existing security systems. The Attivo BOTsink System securely
engages APTs and BOTs as they begin scanning network clients, servers, and
services and then traps their activity in a secure sandbox. Once contained, the
APTs and BOTs will not be able to communicate either within your network or
outside your firewall. Instead, the Attivo BOTsink System captures and
catalogues all attempted communications and propagation activity for future
forensic using our patented Multi-Dimensional Correlation Engine.

Captures All BOT and APT Activity

BOTsinks are deployed on any subnet that has high value
systems targeted by BOTs and APTs for IP and data theft or hosts BYODs. Typically
deployed next to VPN gateway, client and server subnets - increasing detection
velocity and minimizing the chances of cross contamination and contagion. Begin
capturing BOT activity by assigning unused IP addresses to the BOTsink and add
it to the network. The BOTsink identifies infected hosts mounting attacks,
reports the time, type and anatomy of the attack to enable immediate remedial
action, and gives visibility into the life cycle of the BOT. The BOTsink 2500
emulates the most common attacked network services and hosts up to 1,020 IP
addresses to quickly attract and identify BOTs.

Attivo’s BOTsink 2500 is
an on-premise and in-cloud APT and BOT security appliance/VM designed to
augment your existing security systems. The Attivo BOTsink System securely
engages APTs and BOTs as they begin scanning network clients, servers, and
services and then traps their activity in a secure sandbox. Once contained, the
APTs and BOTs will not be able to communicate either within your network or
outside your firewall. Instead, the Attivo BOTsink System captures and
catalogues all attempted communications and propagation activity for future
forensic using our patented Multi-Dimensional Correlation Engine.

Captures
All BOT and APT Activity

BOTsinks are deployed on any subnet that has high value
systems targeted by BOTs and APTs for IP and data theft or hosts BYODs. Typically
deployed next to VPN gateway, client and server subnets - increasing detection
velocity and minimizing the chances of cross contamination and contagion. Begin
capturing BOT activity by assigning unused IP addresses to the BOTsink and add
it to the network. The BOTsink identifies infected hosts mounting attacks,
reports the time, type and anatomy of the attack to enable immediate remedial
action, and gives visibility into the life cycle of the BOT. The BOTsink 2500
emulates the most common attacked network services and hosts up to 1,020 IP
addresses to quickly attract and identify BOTs.

===================================================

Have you ever wondered how it would be if your email suddenly came to life? You are about to find out.
====================================================

In addition to this blog, Netiquette IQ has a website with great
assets which are being added to on a regular basis. I have authored the
premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve,
Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge
Your Email Skills in 60 Minutes. . . And Get That Job!” will be published soon
follow by a trilogy of books on Netiquette for young people. You can view my
profile, reviews of the book and content excerpts at:

If you would like to listen
to experts in all aspects of Netiquette and communication, try my radio show on
BlogtalkRadio
Additionally, I provide content for an online newsletter via paper.li. I
have also established Netiquette discussion groups with Linkedin and Yahoo. I am
also a member of the International Business Etiquette and Protocol Group and
Minding Manners among others. Further, I regularly consult for the Gerson
Lehrman Group, a worldwide network of subject matter experts and have been a
contributor to numerous blogs and publications.

Lastly, I
am the founder and president of Tabula
Rosa Systems, a company that provides “best of breed” products for network,
security and system management and services. Tabula Rosa has a new blog and Twitter site which offers great IT
product information for virtually anyone.

No comments:

Post a Comment

About Us

Tabula Rosa Systems (TRS) is dedicated to providing Best of Breed Technology and Best of Class Professional Services to our Clients. We have a portfolio of products which we have selected for their capabilities, viability and value.